Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Heat Exchanger Performance by Using Dimpled Tube
...Show More Authors

The enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%.  The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 07 2013
Journal Name
Journal Of Educational And Psychological Researches
الخرائط المعرفية ( دراسة نظرية )
...Show More Authors

Cognitive mapping in humans is the process of coding, storing, and processing information that. Can be used in special behavior . Several scientific Domains interfere in the concept of cognitive maps including cognitive Psychology and environmental Psychology. Three papers at the start of the last century introduced the concept of cognitive maps ,  ( Gulliverʼs  ,1908 ) brief note mentioned such maps in the context of teaching children orientation and there was a paper published by                ( Hutorowicz , 1911 ) comprising an abridged translation of a monograph written by ( B .F .Adler ) o

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Applications of contemporary feminist theory and its role in international relations (Singapore as a Model)
...Show More Authors

Since the emergence of the science of international relations as an independent academic scientific field,  various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories,  which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Political Text and Its Translation into Arabic: El texto político y su traducción del español al árabe
...Show More Authors

      Field of translation is sampled with many types of translation, such as the literary, scientific, medical, etc. The translation of grammatical aspects has always been with difficulties.

Political translation is the focus here. There are many general problems faced by translators when translating political texts from Arabic into Spanish. The aim here is to clarify the definition of functions or terms within the text, and to arrive at the correct from of translation of such texts from Spanish into Arabic.  It is worth mentioning that the paper is of two parts: the first exemplifies what is meant by translation, the prerequisites of a translator, along with mentioning the methods followed&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 28 2024
Journal Name
Investment Management And Financial Innovations
Bridging theory and practice: International valuation standards and asset valuation in the telecommunications sector
...Show More Authors

In the rapidly evolving telecommunications industry, accurate valuation of tangible assets remains a critical challenge that requires adherence to universally recognized standards. This study addresses the pressing need for transparent and precise asset valuation methodologies that are pivotal for informed investment decisions and financial reporting. It aims to bridge the theoretical and practical divide in asset valuation by applying International Valuation Standards (IVS) 300 and 400 to Asiacell Communications PJSC, a leading entity in the sector. Focusing on five key tangible assets from 2018 to 2022 – lands, buildings, plant and equipment, means of transport and transfer, and furniture and office equipment – the study emplo

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
The fundamentalist and news theory between the modernity and excessive modernization of the foreground
...Show More Authors

Conclusion :

The conflict between the fundamentalist and news theory in the methodology that each of the two schools pursued with the Twelver Shi'a Imamiyyah in deriving the legal rulings from the sources of legislation, especially in the second source, which is the noble hadith and narration after the Holy Qur’an, which is the first source has gone through multiple and complex stages that led This struggle to excess, stress, exaggeration, negligence, neglect and indulgence by each of the two schools in dealing with the noble hadith and narration and in the manufacture of rules and laws and fundamentalist and juristic theories of the process of jurisprudential development of legal rulings where every school believed and proceed

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Solution of the electromechanical machining problem using the collocation method based on Bernstein polynomials
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Classical and Statistical Optimization of Medium Composition for Promoting Prodigiosin Produced by Local Isolate of Serratia Marcescens
...Show More Authors

Prodigiosin is a ‘natural red pigment produced by Serratia marcescens which exhibits immunosuppressive and anticancer properties in addition to antimicrobial activities. This work presents an attempt to maximize the production of prodigiosin by two different strategies: one factor at time (OFAT) and statistical optimization. The result of OFAT revealed that sucrose and peptone were the best carbon and nitrogen sources for pigment production with concentration of prodigiosin of about 135 mg/ L. This value was increased to 331.6mg/ L with an optimized ratio of C/N (60:40) and reached 356.8 with pH 6 and 2% inoculum size at end of classical optimization. Statistical experimental design based on Response surface methodology was co

... Show More
View Publication Preview PDF
Crossref (5)
Crossref